This commit is contained in:
2023-11-24 17:54:35 +01:00
parent adf3a00bd7
commit eaec057bb1
138 changed files with 6861 additions and 0 deletions

View File

@@ -0,0 +1,26 @@
# Nmap 7.93 scan initiated Sat Oct 28 14:27:53 2023 as: nmap -vv --reason -Pn -T4 -sV -p 53 "--script=banner,(dns* or ssl*) and not (brute or broadcast or dos or external or fuzzer)" -oN /home/simon/CTF/LaokoonHaxorcist/fullpwn/results/10.129.243.131/scans/tcp53/tcp_53_dns_nmap.txt -oX /home/simon/CTF/LaokoonHaxorcist/fullpwn/results/10.129.243.131/scans/tcp53/xml/tcp_53_dns_nmap.xml 10.129.243.131
Nmap scan report for megacorp.htb (10.129.243.131)
Host is up, received user-set (0.035s latency).
Scanned at 2023-10-28 14:27:57 CEST for 164s
PORT STATE SERVICE REASON VERSION
53/tcp open domain? syn-ack ttl 127
| dns-nsec-enum:
|_ No NSEC records found
| fingerprint-strings:
| SSLSessionReq:
|_ 1e8NgBanmCRTbV2FJOqv
| dns-nsec3-enum:
|_ DNSSEC NSEC3 not supported
1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
SF-Port53-TCP:V=7.93%I=7%D=10/28%Time=653CFE83%P=x86_64-pc-linux-gnu%r(SSL
SF:SessionReq,2C,"\0\*\x86L\x81\x82\0\x01\0\0\0\0\0\0\x141e8NgBanmCRTbV2FJ
SF:Oqv\x03com\0\0\x1c\0\x01");
Host script results:
| dns-brute:
|_ DNS Brute-force hostnames: No results.
Read data files from: /usr/bin/../share/nmap
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Sat Oct 28 14:30:41 2023 -- 1 IP address (1 host up) scanned in 168.63 seconds

View File

@@ -0,0 +1,19 @@
;; communications error to 10.129.243.131#53: timed out
; <<>> DiG 9.18.11-2-Debian <<>> -p 53 -x 10.129.243.131 @10.129.243.131
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: SERVFAIL, id: 27975
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4000
;; QUESTION SECTION:
;131.243.129.10.in-addr.arpa. IN PTR
;; Query time: 4536 msec
;; SERVER: 10.129.243.131#53(10.129.243.131) (UDP)
;; WHEN: Sat Oct 28 14:28:02 CEST 2023
;; MSG SIZE rcvd: 56

View File

@@ -0,0 +1,6 @@
; <<>> DiG 9.18.11-2-Debian <<>> AXFR -p 53 @10.129.243.131 megacorp.htb
; (1 server found)
;; global options: +cmd
; Transfer failed.

View File

@@ -0,0 +1,11 @@
;; communications error to 10.129.243.131#53: timed out
; <<>> DiG 9.18.11-2-Debian <<>> AXFR -p 53 @10.129.243.131
; (1 server found)
;; global options: +cmd
;; Query time: 4756 msec
;; SERVER: 10.129.243.131#53(10.129.243.131) (UDP)
;; WHEN: Sat Oct 28 14:28:03 CEST 2023
;; MSG SIZE rcvd: 28

View File

@@ -0,0 +1,3 @@
[*] std: Performing General Enumeration against: megacorp.htb...
[-] Could not resolve domain: megacorp.htb

View File

@@ -0,0 +1,45 @@
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE nmaprun>
<?xml-stylesheet href="file:///usr/bin/../share/nmap/nmap.xsl" type="text/xsl"?>
<!-- Nmap 7.93 scan initiated Sat Oct 28 14:27:53 2023 as: nmap -vv -&#45;reason -Pn -T4 -sV -p 53 &quot;-&#45;script=banner,(dns* or ssl*) and not (brute or broadcast or dos or external or fuzzer)&quot; -oN /home/simon/CTF/LaokoonHaxorcist/fullpwn/results/10.129.243.131/scans/tcp53/tcp_53_dns_nmap.txt -oX /home/simon/CTF/LaokoonHaxorcist/fullpwn/results/10.129.243.131/scans/tcp53/xml/tcp_53_dns_nmap.xml 10.129.243.131 -->
<nmaprun scanner="nmap" args="nmap -vv -&#45;reason -Pn -T4 -sV -p 53 &quot;-&#45;script=banner,(dns* or ssl*) and not (brute or broadcast or dos or external or fuzzer)&quot; -oN /home/simon/CTF/LaokoonHaxorcist/fullpwn/results/10.129.243.131/scans/tcp53/tcp_53_dns_nmap.txt -oX /home/simon/CTF/LaokoonHaxorcist/fullpwn/results/10.129.243.131/scans/tcp53/xml/tcp_53_dns_nmap.xml 10.129.243.131" start="1698496073" startstr="Sat Oct 28 14:27:53 2023" version="7.93" xmloutputversion="1.05">
<scaninfo type="syn" protocol="tcp" numservices="1" services="53"/>
<verbose level="2"/>
<debugging level="0"/>
<taskbegin task="NSE" time="1698496077"/>
<taskend task="NSE" time="1698496077"/>
<taskbegin task="NSE" time="1698496077"/>
<taskend task="NSE" time="1698496077"/>
<taskbegin task="NSE" time="1698496077"/>
<taskend task="NSE" time="1698496077"/>
<taskbegin task="SYN Stealth Scan" time="1698496077"/>
<taskend task="SYN Stealth Scan" time="1698496077" extrainfo="1 total ports"/>
<taskbegin task="Service scan" time="1698496077"/>
<taskend task="Service scan" time="1698496225" extrainfo="1 service on 1 host"/>
<taskbegin task="NSE" time="1698496225"/>
<taskend task="NSE" time="1698496240"/>
<taskbegin task="NSE" time="1698496240"/>
<taskend task="NSE" time="1698496241"/>
<taskbegin task="NSE" time="1698496241"/>
<taskend task="NSE" time="1698496241"/>
<host starttime="1698496077" endtime="1698496241"><status state="up" reason="user-set" reason_ttl="0"/>
<address addr="10.129.243.131" addrtype="ipv4"/>
<hostnames>
<hostname name="megacorp.htb" type="PTR"/>
</hostnames>
<ports><port protocol="tcp" portid="53"><state state="open" reason="syn-ack" reason_ttl="127"/><service name="domain" servicefp="SF-Port53-TCP:V=7.93%I=7%D=10/28%Time=653CFE83%P=x86_64-pc-linux-gnu%r(SSLSessionReq,2C,&quot;\0\*\x86L\x81\x82\0\x01\0\0\0\0\0\0\x141e8NgBanmCRTbV2FJOqv\x03com\0\0\x1c\0\x01&quot;);" method="table" conf="3"/><script id="dns-nsec-enum" output="&#xa; No NSEC records found&#xa;"/><script id="fingerprint-strings" output="&#xa; SSLSessionReq: &#xa; 1e8NgBanmCRTbV2FJOqv"><elem key="SSLSessionReq">&#xa; 1e8NgBanmCRTbV2FJOqv</elem>
</script><script id="dns-nsec3-enum" output="&#xa; DNSSEC NSEC3 not supported&#xa;"/></port>
</ports>
<hostscript><script id="dns-brute" output="&#xa; DNS Brute-force hostnames: No results."><table key="DNS Brute-force hostnames">
</table>
</script></hostscript><times srtt="35361" rttvar="35361" to="176805"/>
</host>
<taskbegin task="NSE" time="1698496241"/>
<taskend task="NSE" time="1698496241"/>
<taskbegin task="NSE" time="1698496241"/>
<taskend task="NSE" time="1698496241"/>
<taskbegin task="NSE" time="1698496241"/>
<taskend task="NSE" time="1698496241"/>
<runstats><finished time="1698496241" timestr="Sat Oct 28 14:30:41 2023" summary="Nmap done at Sat Oct 28 14:30:41 2023; 1 IP address (1 host up) scanned in 168.63 seconds" elapsed="168.63" exit="success"/><hosts up="1" down="0" total="1"/>
</runstats>
</nmaprun>